O'Reilly logo

Fuzzing: Brute Force Vulnerability Discovery by Pedram Amini, Adam Greene, Michael Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 25. Lessons Learned

 

“Rarely is the question asked: Is our children learning?”

 
 --George W. Bush, Florence, SC, January 11, 2000

We hope that at this point we have been able to paint a clear picture of what fuzzing is, why it is effective, and how it can be implemented to unveil hidden faults in program code. Up front, we mentioned that this book is geared toward three distinct target audiences that can benefit from the power of fuzzing: developers, QA team members, and security researchers. In this chapter we break down the software development lifecycle (SDLC) to determine where each of these groups can apply fuzzing to build secure software.

Software Development Lifecycle

Fuzzing was once a technique used almost exclusively by security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required